VulnerabilitiesHIGH

Android Intent Redirection Vulnerability Exposes Millions

Featured image for Android Intent Redirection Vulnerability Exposes Millions
#EngageSDK#Android#intent redirection#vulnerability#Microsoft

Original Reporting

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelHIGH

Significant risk — action recommended within 24-48 hours

🛡️
🛡️ VULNERABILITY DETAILS
CVE ID
CVSS Score
Severity RatingSevere
Affected ProductEngageSDK
VendorEngageLab
Vulnerability TypeIntent Redirection
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Actively ExploitedNot observed
Patch AvailableYes
Workaround Available
🎯

Basically, a flaw in an Android SDK could let bad apps steal your data.

Quick Summary

A severe vulnerability in EngageSDK risks sensitive data across millions of Android wallets. Developers must update their SDKs to protect users. This flaw highlights the importance of secure third-party integrations.

What Happened

During routine security research, Microsoft identified a severe intent redirection vulnerability in the EngageSDK, a widely used third-party Android SDK. This flaw allows apps on the same device to bypass Android's security sandbox, gaining unauthorized access to sensitive user data. With over 30 million installations of third-party crypto wallet applications alone, the risk to personal identifiable information (PII), user credentials, and financial data is significant.

Who's Affected

The vulnerability affects millions of Android users who have installed apps utilizing the EngageSDK. Specifically, it impacts third-party crypto wallet applications, which are often used to manage digital assets. All detected apps using vulnerable versions have been removed from Google Play to mitigate risk.

What Data Was Exposed

Sensitive data exposed includes:

  • Personal Identifiable Information (PII)
  • User credentials
  • Financial data

What You Should Do

Developers integrating the EngageSDK should upgrade to version 5.2.1 or later, which resolves this vulnerability. Users who previously downloaded a vulnerable app are now protected due to Android's updated security measures.

The Flaw

The intent redirection vulnerability occurs when a threat actor manipulates the contents of an intent sent by a vulnerable app. This allows unauthorized access to protected components and sensitive data, potentially leading to privilege escalation within the Android environment.

What's at Risk

The risk extends to any application that relies on the EngageSDK for messaging and notifications. Given the high value of digital asset management, even minor flaws can have large-scale implications.

Patch Status

EngageLab has resolved the issue in version 5.2.1 of the EngageSDK, released on November 3, 2025. Developers must ensure they are using this updated version to protect their applications from exploitation.

Immediate Actions

  • Developers: Review dependencies and validate exported components in your applications. Follow best practices for secure integration of third-party SDKs.
  • Users: Ensure your apps are updated to the latest versions and monitor for any unusual activity in your accounts.

Conclusion

This vulnerability highlights the importance of scrutinizing third-party SDKs and their integration into applications. As mobile wallets and high-value apps become more common, vigilance is essential to safeguard user data against potential exploitation. Microsoft continues to provide resources and guidance to help developers strengthen their applications against such vulnerabilities.

🔍 How to Check If You're Affected

  1. 1.Review your app's dependencies for the EngageSDK.
  2. 2.Check if your app is using version 5.2.1 or later of EngageSDK.
  3. 3.Monitor for any unauthorized access or unusual behavior in your app.

🏢 Impacted Sectors

TechnologyFinance

Pro Insight

🔒 Pro insight: The EngageSDK flaw underscores the critical need for robust vetting of third-party libraries to prevent widespread vulnerabilities in mobile applications.

Sources

Original Report

MSMicrosoft Security Blog· Microsoft Defender Security Research Team
Read Original

Related Pings

HIGHVulnerabilities

GPL Odorizers GPL750 - Vulnerability Exposed Critical Flaw

A serious vulnerability in GPL Odorizers GPL750 could allow remote attackers to manipulate gas line odorant levels. Users are urged to update their systems immediately to mitigate risks.

CISA Advisories·
CRITICALVulnerabilities

Contemporary Controls BASC 20T - Critical Vulnerability Exposed

A critical vulnerability in the Contemporary Controls BASC 20T could allow attackers to manipulate PLC components. Users must act quickly to secure their systems against potential exploitation.

CISA Advisories·
HIGHVulnerabilities

Internet-Exposed ICS Devices Raise Security Risks

Exposed ICS devices using insecure protocols like Modbus raise serious security concerns. Critical sectors may face disruptions and sabotage. Urgent action is needed to secure these systems.

Security Affairs·
HIGHVulnerabilities

SonicWall SMA1000 - Multiple Vulnerabilities Discovered, Immediate Patching Required

SonicWall has issued critical patches for multiple vulnerabilities in its SMA1000 series appliances, including a high-severity SQL injection flaw that could allow attackers to escalate privileges and bypass multi-factor authentication.

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Palo Alto Networks - Security Advisory AV26-331 Released

Palo Alto Networks has issued a critical security advisory addressing vulnerabilities in several products, including a high-severity flaw in Microsoft Teams integration that could allow unauthorized data access.

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Mitel Security Advisory - Vulnerabilities in MiCollab Exposed

Mitel has issued a security advisory for vulnerabilities in MiCollab software. Users must update to the latest version to avoid security risks. Don't delay in securing your systems!

Canadian Cyber Centre Alerts·